首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   846篇
  免费   71篇
  国内免费   57篇
电工技术   84篇
综合类   53篇
化学工业   100篇
金属工艺   48篇
机械仪表   58篇
建筑科学   54篇
矿业工程   12篇
能源动力   16篇
轻工业   38篇
水利工程   10篇
石油天然气   93篇
武器工业   9篇
无线电   142篇
一般工业技术   88篇
冶金工业   35篇
原子能技术   29篇
自动化技术   105篇
  2024年   1篇
  2023年   11篇
  2022年   26篇
  2021年   35篇
  2020年   19篇
  2019年   20篇
  2018年   19篇
  2017年   33篇
  2016年   17篇
  2015年   25篇
  2014年   52篇
  2013年   43篇
  2012年   44篇
  2011年   73篇
  2010年   48篇
  2009年   55篇
  2008年   34篇
  2007年   47篇
  2006年   47篇
  2005年   40篇
  2004年   42篇
  2003年   25篇
  2002年   30篇
  2001年   25篇
  2000年   19篇
  1999年   25篇
  1998年   9篇
  1997年   21篇
  1996年   13篇
  1995年   24篇
  1994年   8篇
  1993年   6篇
  1992年   17篇
  1991年   10篇
  1990年   3篇
  1989年   2篇
  1988年   4篇
  1985年   1篇
  1982年   1篇
排序方式: 共有974条查询结果,搜索用时 0 毫秒
941.
A new austenite-bainite polyphase steel with nodular carbides can be obtained by controlling the solidification structure of the steel melt, which only contains manganese and silicon, with modification of Si-Ca-B compound and air-hardening. The result indicates that the nodular carbide is in the eutectic form of austenite and (Fe, Mn)3C, which is formed between the austenitic dendrites during solidification due to element segregation. The modifying elements (calcium, silicon, etc.) have the following functions: (1) their chemical compounds (CaS, SiO2) are formed preferentially during solidification to act as heterogeneous nuclei for nodular eutectic crystallization, (2) the eutectic can be turned into the nodular shape after modification because of the decrease in the amount of the adsorbed impurity elements (oxygen and sulphur) and silicon enriched on the eutectic growth interface. The quantity of nodular eutectic makes up 10%–20%, with a size of 15–25 μm. The hardness and the toughness of this steel are 40–50 HRC and 20–40 J, respectively, and hence its wear-resistance can be more greatly increased than that of the austenite-manganese steel and the austenite-bainite steel. This revised version was published online in November 2006 with corrections to the Cover Date.  相似文献   
942.
BB84量子密钥分发协议是基于合法用户,没有涉及到用户的身份认证问题,因此协议很容易遭受中间相遇攻击.笔者提出了一种改进方案,不仅可以解决用户的身份认证问题,还可以大大提高获得有用密钥比特的效率.  相似文献   
943.
944.
在中锰钢基础上,采用变质处理获得新型铸态抗磨钢:碳化物四球化典氏作-贝氏体钢它具有高强韧性、高耐磨性,是一种有广阔应用前景的新型抗磨材料.  相似文献   
945.
关于延长HN系列激光管寿命方法的研究   总被引:1,自引:0,他引:1  
根据对激光器工作原理和影响激光器使用寿命的两个主要因素──激光管漏气、变形的分析,提出适当增加激光器能源泵的输出能量,可以延长激光管的使用寿命。  相似文献   
946.
2-D metallic photonic crystals without defects, with point defects, and with a Fabry-Perot (F-P) defect are characterized by terahertz time-domain spectroscopy. The metal parallel-plate waveguide (PPWG) with single TEM-mode propagation is used as a tool to simulate 2-D photonic crystals in free space. The 2-D metallic photonic-crystal structures were fabricated by coating Au on an SU-8 polymer cylinder array. Wide terahertz bandgaps were observed in the photonic crystals within the PPWG. The experimental measurements have excellent agreement to 2-D photonic-crystal theory without defects. Defect modes are observed in the samples with defects and show the F-P defect has a strong localization effect  相似文献   
947.
In a large scale sensor network, it is infeasible to assign a unique Transport Layer Key (TLK) for each pair of nodes to provide the end-to-end security due to the huge memory cost per node. Thus, conventional key establishment schemes follow a key predistribution approach to establish a Link Layer Key (LLK) infrastructure between neighboring nodes and rely on multihop paths to provide the end-to-end security. Their drawbacks include vulnerability to the node compromise attack, large memory cost, and energy inefficiency in the key establishment between neighboring nodes. In this paper, we propose a novel key establishment scheme, called LAKE, for sensor networks. LAKE uses a t-degree trivariate symmetric polynomial to facilitate the establishment of both TLKs and LLKs between sensor nodes in a two-dimensional space, where each node can calculate direct TLKs and LLKs with some logically neighboring nodes and rely on those nodes to negotiate indirect TLKs and LLKs with other nodes. Any two end nodes can negotiate a TLK on demand directly or with the help of only one intermediate node, which can be determined in advance. As for the LLK establishment, LAKE is more secure under the node compromise attack with much less memory cost than conventional solutions. Due to the location-based deployment, LAKE is also energy efficient in that each node has direct LLKs with most neighbors without spending too much energy on the establishment of indirect LLKs with neighbors through multihop routing.  相似文献   
948.
Securing Mobile Ad Hoc Networks with Certificateless Public Keys   总被引:2,自引:0,他引:2  
This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information. It thus eliminates the need for certificate-based authenticated public-key distribution indispensable in conventional public-key management schemes. IKM features a novel construction method of ID-based public/private keys, which not only ensures high-level tolerance to node compromise, but also enables efficient network-wide key update via a single broadcast message. We also provide general guidelines about how to choose the secret-sharing parameters used with threshold cryptography to meet desirable levels of security and robustness. The advantages of IKM over conventional certificate-based solutions are justified through extensive simulations. Since most MANET security mechanisms thus far involve the heavy use of certificates, we believe that our findings open a new avenue towards more effective and efficient security design for MANETs  相似文献   
949.
费宇光  周军 《微计算机信息》2006,22(18):292-294
本文首先分析H.264/AVC中CABAC的主要过程,随后介绍了两种提高编码效率的改进方法,然后提出了一种新的提高编码速度的算术码快速算法。实验结果表明,本文提出的快速算法在编码效率没有明显降低的条件下,其编码速度有一定的提高,同时也不需要存储空间,从而比较适用于对实时性和存储空间要求高的场合。  相似文献   
950.
在数据流上建立有效的分类模型具有许多应用.流数据的动态性给业界提出了两个关键问题:如何监测数据流的变化;一旦发生显著变化,如何高效地组织足够的训练数据,调整无效的模型.提出了一个基于半监督学习的分类算法,较好地解决了这些问题.设计了一种识别显著变化的可靠方法;提出了一个基于naive Bayes的EM算法,利用较少的类标数据来扩大训练数据集,从而极大地降低类标数据的需求量.基于新的训练数据可以构建一个有效的分类器.实验结果证明了算法的优势.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号